Key Assets | Threats | Existing Controls | Likelihood | Consequence | Level of Risk |
User login information and records | Unauthorized access of passwords and username | Encryption of passwords | Possible | Moderate | Medium |
Backup storage | Corruption, loss of information | Firewalls, Encryption | Possible | Moderate | Medium |
Cloud service | Attacks affecting the system | Firewalls, Encryption | Possible | Moderate | Medium |
Internet Service provider | Attacks affecting the system. | Firewalls, Encryption | Possible | Minor | Medium |
Policies and Procedures | Unauthorized modification of information | Annual reviews and check ins | Rare | Insignificant | Low |